🎉 VSEC Test v3.1.1 is now live! Release Notes ↗
NET Test Cases (Coming Soon)

NET Test Cases (Coming Soon)

This page details all Test Cases available through VSEC Test. All test cases can be run through the VSEC Test web app or via terminal on the Bench.

Supported TLS Cipher Scan

Note: This test case is available exclusively with a NET Test Case subscription ↗.

Iterates through all known TLS ciphers and attempts a connection to the web server with each. Accepted ciphers are reported.

Fail Condition: if a weak cipher is accepted the test will be marked as failed.

Parameters

NameDefault ValueDescription
Network Interfaceeth0The network interface on which to interact
Target IP10.1.0.1The IP to use when attempting to connect to
Target Port443The port to connect to
Temporary IP10.1.0.12A temporary IP address to set on the network interface, which will be reset after the test completes
Temporary Subnet Mask255.255.255.0A temporary subnet mask to set on the network interface, which will be reset after the test completes

Outcomes

SUCCESS: The specified TLS server negotiates strong ciphers.

Recommendations:

NO_RESPONSE: The test failed to communicate with the specified target_host

Recommendations:

  • Check test parameters, physical connections and device power.

FAILURE: The specified TLS server allows negotiating weak ciphers.

Recommendations:

  • Review the destination of the offending TLS connection and modify that server’s configuration.

Example Usage

bw_cli run -a supported_tls_ciphers -p iface=eth0 -p target_host=10.1.0.1 -p target_port=443 -p temp_ip=10.1.0.12 -p temp_mask=255.255.255.0

Supported TLS Version Scan

Note: This test case is available exclusively with a NET Test Case subscription ↗.

Attempts a connection to the target host with each version of TLS.

Fail Condition: If TLS 1.0 or 1.1 connects successfully the test will be marked as failed.

Parameters

NameDefault ValueDescription
Network Interfaceeth0The network interface on which to interact
Target IP/hostname10.1.0.1The IP or hostname to use when attempting to connect to
Port443The port to connect to
Temporary IP10.1.0.12A temporary IP address to set on the network interface, which will be reset after the test completes
Temporary Subnet Mask255.255.255.0A temporary subnet mask to set on the network interface, which will be reset after the test completes

Outcomes

SUCCESS: The specified TLS server negotiates strong versions.

Recommendations:

NO_RESPONSE: The test failed to communicate with the specified target_host

Recommendations:

  • Check test parameters, physical connections and device power.

FAILURE: The specified TLS server allows negotiating weak versions.

Recommendations:

  • Review the destination of the offending TLS connection and modify that server’s configuration.

Example Usage

bw_cli run -a supported_tls_versions -p iface=eth0 -p target_host=10.1.0.1 -p target_port=443 -p temp_ip=10.1.0.12 -p temp_mask=255.255.255.0

Observed TLS Version

Note: This test case is available exclusively with a NET Test Case subscription ↗.

Observes traffic outgoing from a specific IP and checks that its TLS version is at least 1.2.

Fail Condition: If any TLS traffic is sent by the host that is using a version less than TLS 1.2 this test will be marked as failed

Parameters

NameDefault ValueDescription
Network Interfaceeth0The network interface on which to interact with the DNS Server
Target Host10.1.0.1The IP who’s packets to inspect

Outcomes

SUCCESS: No traffic was observed originating from the specified target_host using an insecure TLS version

Recommendations:

NO_RESPONSE: No traffic was observed originating from the specified target_host

Recommendations:

  • Check physical connections and device power.
  • Ensure you are in a network position where target’s traffic will be seen by test

FAILURE: Communication was observed originating from the target_host using an insecure TLS version.

Recommendations:

  • Review the destination of the offending TLS connection and determine if this insecure protocol version can be replaced.

Example Usage

bw_cli run -a observed_tls_version -p iface=eth0 -p target_host=10.1.0.1

SSH Password Authentication Check

Note: This test case is available exclusively with a NET Test Case subscription ↗.

Checks if an SSH server supports password authentication by attempting to connect to it.

Fail Condition: If the SSH Server does support password authentication, this test will be marked as failed.

Parameters

NameDefault ValueDescription
Network Interfaceeth0The network interface on which to interact with the DNS Server
Target IP10.1.0.1The IP to use when attempting to connect
Target Port8000The port to use when attempting to connect
Temporary IP10.1.0.12A temporary IP address to set on the network interface, which will be reset after the test completes
Temporary Subnet Mask255.255.255.0A temporary subnet mask to set on the network interface, which will be reset after the test completes

Outcomes

SUCCESS: The specified SSH server rejected password login.

Recommendations:

NO_RESPONSE: The test failed to communicate with the specified target_host

Recommendations:

  • Check test parameters, physical connections and device power.

FAILURE: The specified SSH server allows password login.

Recommendations:

  • Review the offending SSH server and modify that server’s configuration.

Example Usage

bw_cli run -a ssh_pass_check -p iface=eth0 -p target_host=10.1.0.1 -p target_port=8000 -p temp_ip=10.1.0.12 -p temp_mask=255.255.255.0

mTLS Self Signed Cert Connection

Note: This test case is available exclusively with a NET Test Case subscription ↗.

Attempts to connect to a mutual TLS service with a self signed certificate and expects to be rejected for invalid credentials.

Fail Condition: If any mTLS server accepts a connection with these invalid credentials the test will be marked failed.

Parameters

NameDefault ValueDescription
Network Interfaceeth0The network interface on which to interact with the DNS Server
mTLS URIhttps://10.1.0.1:8883The URI of the mTLS Server to attempt to connect to
Temporary IP10.1.0.12A temporary IP address to set on the network interface, which will be reset after the test completes
Temporary Subnet Mask255.255.255.0A temporary subnet mask to set on the network interface, which will be reset after the test completes

Outcomes

SUCCESS: The specified mTLS server is enforcing client authentication and rejects self signed client certificates.

Recommendations:

NO_RESPONSE: The test failed to communicate with the specified target_host

Recommendations:

  • Check test parameters, physical connections and device power.

FAILURE: The specified mTLS server allows authentication with self signed client certificates.

Recommendations:

  • Review the destination of the offending TLS connection and modify that server’s configuration.

Example Usage

bw_cli run -a mtls_self_signed -p iface=eth0 -p uri=https://10.1.0.1:8883 -p temp_ip=10.1.0.12 -p temp_mask=255.255.255.0

Telnet Check

Note: This test case is available exclusively with a NET Test Case subscription ↗.

Attempts to connect to a telnet server at the specified IP and port.

Fail Condition: If a telnet server responds, the test will be marked failed.

Parameters

NameDefault ValueDescription
Network Interfaceeth0The network interface on which to interact
Target IP10.1.0.1The IP to use when attempting to connect to
Telnet Port23The port number to attempt to connect to telnet on
Temporary IP10.1.0.12A temporary IP address to set on the network interface, which will be reset after the test completes
Temporary Subnet Mask255.255.255.0A temporary subnet mask to set on the network interface, which will be reset after the test completes

Outcomes

SUCCESS: The specified Telnet server rejected anonymous login.

Recommendations:

  • Ensure the credentials are secure and ideally unique per device.

NO_RESPONSE: The test failed to communicate with the specified target_host

Recommendations:

  • Check test parameters, physical connections and device power.

FAILURE: The specified Telnet server allows anonymous login.

Recommendations:

  • Review the offending Telnet server and modify that server’s configuration.

Example Usage

bw_cli run -a telnet_check -p iface=eth0 -p target_host=10.1.0.1 -p target_port=23 -p temp_ip=10.1.0.12 -p temp_mask=255.255.255.0
Last updated on